IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
AttackIQ has released a new attack graph that emulates the behaviors exhibited by BlackByte ransomware, a strain operated ...
Threat groups are weaponizing industrial control access they’ve gained over the years, but critical infrastructure operators ...
A fake CAPTCHA scam is tricking Windows users into running PowerShell commands that install StealC malware and steal passwords, crypto wallets, and more.
As Chief Information Security Officers (CISOs) and security leaders, you are tasked with safeguarding your organization in an ...
VOID#GEIST malware campaign delivers XWorm, AsyncRAT, and Xeno RAT using batch scripts, Python loaders, and explorer.exe injection.
File and folder security is crucial in this day and age. There are apps you can use to heighten the security of your files. These apps are free and available for desktop and mobile devices. The need ...
The commonly used RSA encryption algorithm can now be cracked by a quantum computer with only 100,000 qubits, but the technical challenges to building such a machine remain numerous ...
The Hacker News is the top cybersecurity news platform, delivering real-time updates, threat intelligence, data breach ...
Microsoft has identified a phishing campaign using malformed links to legitimate OAuth services to redirect to malware ...
With bigger tax refunds expected this season, it can be tempting to file returns earlier than usual. But incomplete filings can raise flags for the IRS, delaying processing or even triggering an audit ...